Legal Obligations

PRIVACY LAW

Look through articles on your specific area and write notes to these 3 questions
  • Who is resposible for the law?
  • When was the law created?
  • Who does the law target?
  • What has the law to do about privacy of information?
  • What are some of the consequences of breaking the law?

Privacy Act (Commonwealth Government)
Page 206 of text
http://www.austlii.edu.au/au/legis/cth/consol_act/pa1988108/

Privacy Ammendment Act 2004(Commonwealth Government)
Page 206-7 of text
http://www.austlii.edu.au/au/legis/cth/consol_act/paa2004188/

Information Privacy Act 2000 (Victorian Government)
Page 208 of text
http://www.austlii.edu.au/au/legis/vic/consol_act/ipa2000231/index.html
http://www.privacy.vic.gov.au/dir100/priweb.nsf/content/AAF32B312EE4BE7BCA256C4D000EF235

HEALTH RECORD ACT(Victorian Government)
Page 208 of text
http://www.austlii.edu.au/au/legis/vic/consol_act/hra2001144/index.html
http://www.health.vic.gov.au/healthrecords/

COPYRIGHT LAW

copyright_web_lesson.pdf

Copyright Ammendment (Digital Agenda) Act 2000
http://www.austlii.edu.au/au/legis/cth/consol_act/caaa2000294/

Australian Copyright Council
http://www.copyright.org.au/
Public record Office Australia
http://www.access.prov.vic.gov.au/public/PROVguides/PROVguide025/PROVguide025.jsp
Australasian Legal Information Institute
http://www.austlii.edu.au/au/legis/cth/consol_act/ca1968133/


http://www.wired.com/threatlevel/2009/06/thomasfollow/
"Thursday’s $1.92 million file-sharing verdict against a Minnesota mother of four could provide copyright reform advocates with a powerful human symbol of the draconian penalties written into the nearly-35 year old [American] Copyright Act. Then again, maybe not."

Copyright Act 1968

Ethical obligations

Article
Behind the scene Behind the Scenes_QuestionSheet.doc
Intenet and Email Acceptable Use Policy Internet&Email AUP.doc

Ethical Decision Making Thinking Tool
Inspiration Template
Word Template
Example-Should a manager in a shop(such as a petrol station) be allowed to use surveillance hardware to record actions of customers.



Consequences to violation of data security